1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bulgar [2K]
3 years ago
11

What process does a system use to officially permit access to a file or a program CIS 502 ?

Computers and Technology
1 answer:
ipn [44]3 years ago
4 0

Answer:

Authorization                                

Explanation:

Authorization is a security process to determine access levels related to system resources such as files, services, computer programs, data and application features. This is the method of allowing or denying access to a resource which enables the user to get access to various services and resources depending on the user's identity.

Authorization is the process that checks if a user has the permission to get access to a particular file or perform a particular action, ensuring that user has successfully authenticated himself. It refers to defining access policy.

For example a system administrator determines for the system device, in multi-user computer systems, which users are granted access to system and its resources and privileges are granted.

You might be interested in
Which quality allows programmers to modify a program as and when required
lana66690 [7]
I think Flexibility. Because when you are flexible you are able to manage things at anytime.
5 0
2 years ago
Read 2 more answers
The Quick Search capability is found on which control?
choli [55]

Answer:

backstage view

Explanation:

6 0
2 years ago
What are the main types of reading tools? Check all that apply. please HELP​
vovangra [49]

Answer:

Comprehension

reference

3 0
2 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
What is missing in this list of information needed to cite a book?
balandron [24]

Answer:

<h3><em><u>C</u></em><em><u>.</u></em><em><u> </u></em><em><u> </u></em><em><u>City</u></em><em><u> </u></em><em><u>and</u></em><em><u> </u></em><em><u>state</u></em><em><u> </u></em><em><u>where</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>was</u></em><em><u> </u></em><em><u>published</u></em></h3>

Explanation:

<h3>#CarryOnLearning</h3>

{hope it helps}}

4 0
2 years ago
Other questions:
  • Ideally, how often should you back up the data on your computer? once an hour, once a day, once a month, once a year. Please hur
    5·2 answers
  • Need help answering this
    7·1 answer
  • While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using
    5·2 answers
  • What network setting do i need for a workgroup?
    5·1 answer
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • "The ability to create methods with the same name that are in different classes" is known as ________.
    14·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • "A user reports that the corporate web server cannot be accessed. A technician verifies that the web server can be accessed by i
    8·1 answer
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!